Aaand suddently VM-exit latencies on Intel CPUs will go through the roof, oh, and if you're still putting different guests on sibling hyperthreads you're going to get pwned and you know it. Good job, Intel. You saved a few AND gates. Was it worth it? https://www.redhat.com/en/blog/understanding-l1-terminal-fault-aka-foreshadow-what-you-need-know …
-
Show this thread
-
This speculation saga just keeps getting worse and worse, which goes on to show that there's a huge disconnect between CPU designers and security researchers. This is the CPU equivalent of foo = bar[untrusted]; if (untrusted > bound) return 0; do_stuff(foo);. Who does that?!
1 reply 3 retweets 25 likesShow this thread -
"Let's use garbage bits for something, it's fine, we'll throw away the result later". No. No it isn't fine. Why the fuck would that ever be a good idea? If you can't take the fault immediately at least poison the garbage data with zeroes!
2 replies 4 retweets 20 likesShow this thread -
Replying to @marcan42
it's honestly not obvious that this is a bad idea other than in hindsight; I know I'd make the same mistake
3 replies 0 retweets 0 likes -
Replying to @whitequark
This is like saying buffer overflows are fine as long as you overflow into data you don't care about anyway. It's basic security hygiene. Betting your security on the bug (it's a bug) not being exploitable.
2 replies 0 retweets 2 likes -
Replying to @marcan42 @whitequark
I just hope that it’ll be possible to disable these “fixes”, because there are environments in which a local attacker is not a plausible threat. But it seems no, this’ll be shoved down our throats, and 2019 will be the first year in which processors get slower instead of faster.
3 replies 0 retweets 0 likes -
Replying to @Myriachan @whitequark
Some of the fixes have negligible impact. Those are always on. Some don't. Those are controlled by kernel commandline parameters. See Documentation/admin-guide/kernel-parameters.txt (grep for spectre_v2 and spec_store_bypass_disable and pti)
1 reply 0 retweets 2 likes
But really, the cases in which you want these things off are pretty limited. Most of this stuff hurts performance on context changes (cross-process and cross-VM), and workloads bounded by that are... more often than not people serving stuff over the internet.
-
-
Also, some of these bugs are exploitable remotely. With shitty throughput, but you don't need much throughput to steal an encryption key. I already predicted this earlier this year (hard but not impossible) and well, people found a way: https://www.zdnet.com/article/new-spectre-attack-can-remotely-steal-secrets-researchers-say/ …
0 replies 0 retweets 2 likesThanks. Twitter will use this to make your timeline better. UndoUndo
-
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.